General
-
Target
0653719e29833b588ba645f8e2d429acd0a207bd11a0c29d76537f9c35de6826
-
Size
812KB
-
Sample
241111-hcv9javfqa
-
MD5
b47e74513379222aa230a76bd85929ac
-
SHA1
18e780f1497d026ff9147ea89ab1105d26c60154
-
SHA256
0653719e29833b588ba645f8e2d429acd0a207bd11a0c29d76537f9c35de6826
-
SHA512
5e142b1b2bc68762f1183daf6d6b27996b29e1a411b6b2ff76571176937a2180dcfc25cf8f42a27b730fac4747ae2428fbf49f6f8b4477b5d80d9ce49890c7af
-
SSDEEP
24576:/yf9VGB0W++08lj9poQCkK+8lb78lcUo5:Kf9gB0/VK/skyN+
Static task
static1
Behavioral task
behavioral1
Sample
0653719e29833b588ba645f8e2d429acd0a207bd11a0c29d76537f9c35de6826.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
0653719e29833b588ba645f8e2d429acd0a207bd11a0c29d76537f9c35de6826
-
Size
812KB
-
MD5
b47e74513379222aa230a76bd85929ac
-
SHA1
18e780f1497d026ff9147ea89ab1105d26c60154
-
SHA256
0653719e29833b588ba645f8e2d429acd0a207bd11a0c29d76537f9c35de6826
-
SHA512
5e142b1b2bc68762f1183daf6d6b27996b29e1a411b6b2ff76571176937a2180dcfc25cf8f42a27b730fac4747ae2428fbf49f6f8b4477b5d80d9ce49890c7af
-
SSDEEP
24576:/yf9VGB0W++08lj9poQCkK+8lb78lcUo5:Kf9gB0/VK/skyN+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1